The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ext…
If you like book The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws here is the list of books you may also like
Buy this book on AmazonSimilar books (20)
-
The Tangled Web: A Guide to Securing Modern Web Applications
"Thorough and comprehensive coverage from one of the foremost experts in browser security."
Buy this book on Amazon
—Tavis Ormandy, Google Inc.
Modern web applications are built on a tangle of technologies that have been deve… -
This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market-the most secretive, invisible, government-backed market on earth-and a terrifying first look…
Buy this book on Amazon -
-
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking…
Buy this book on Amazon -
Bug Bounty Bootcamp
Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You'll also learn how …
Buy this book on Amazon -
Permanent Record
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system …
Buy this book on Amazon -
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
Buy this book on Amazon
In Black Hat Python, the latest from Jus… -
The Republic
Presented in the form of a dialogue between Socrates and three different interlocutors, this classic text is an enquiry into the notion of a perfect community and the ideal individual within it. Durin…
Buy this book on Amazon -
The Pragmatic Programmer: From Journeyman to Master
Straight from the programming trenches, The Pragmatic Programmer cuts through the increasing specialization and technicalities of modern software development to examine the core process--taking a …
Buy this book on Amazon -
Breaking into Information Security: Learning the Ropes 101
Buy this book on Amazon -
Mastery
In this book, Robert Greene demonstrates that the ultimate form of power is mastery itself. By analyzing the lives of such past masters as Charles Darwin, Benjamin Franklin, Albert Einstein, and Leona…
Buy this book on Amazon -
Hacking: The Art of Exploitation w/CD
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking." It shows how hackers exploit programs and write exploits, instead…
Buy this book on Amazon -
The 48 Laws of Power
Amoral, cunning, ruthless, and instructive, this multi-million-copy New York Times bestseller is the definitive manual for anyone interested in gaining, observing, or defending against ultimate contro…
Buy this book on Amazon -
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.…
Buy this book on Amazon -
Discourses and Selected Writings
Epictetus, a Greek Stoic and freed slave, ran a thriving philosophy school in Nicopolis in the early second century AD. His animated discussions were celebrated for their rhetorical wizardry and were …
Buy this book on Amazon -
Head First Java
Learning a complex new language is no easy task especially when it s an object-oriented computer programming language like Java. You might think the problem is your brain. It seems to have a mind of i…
Buy this book on Amazon -
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code…
Buy this book on Amazon -
-
The Hacker Playbook 3: Practical Guide To Penetration Testing
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put you…
Buy this book on Amazon -